Skip to main content

Security enhancement schemes for wireless networks, 2008

 Item — Call Number: MU Thesis Gue
Identifier: b2090075

Scope and Contents

From the Collection:

The collection consists of theses written by students enrolled in the Monmouth University graduate Computer Science program. The holdings are primarily bound print documents that were submitted in partial fulfillment of requirements for the Master of Science degree.

Dates

  • Creation: 2008

Creator

Conditions Governing Access

The collection is open for research use. Access is by appointment only.

Access to the collection is confined to the Monmouth University Library and is subject to patron policies approved by the Monmouth University Library.

Collection holdings may not be borrowed through interlibrary loan.

Research appointments are scheduled by the Monmouth University Library Archives Collections Manager (723-923-4526). A minimum of three days advance notice is required to arrange a research appointment for access to the collection.

Patrons must complete a Researcher Registration Form and provide appropriate identification to gain access to the collection holdings. Copies of these documents will be kept on file at the Monmouth University Library.

Extent

1 Items (print book) : 178 pages ; 8.5 x 11.0 inches (28 cm).

Language of Materials

English

Abstract

The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communicating parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such system showed that these mechanisms can be defied. In this thesis, we propose two new schemes. The first employs a neural network decision engine that restricts network access to mobile nodes whose phyiscal location is within a threshold distance from the wireless access point or the controller of the network. This method gives an extra layer of security and allows enforcing policies by which network access is only allowed from a certain section of the network. The second tackles the disassociation packet security flaw by which a malicious attacker can disconnect all network users by injecting two or more false management frames into the network. Our scheme proposes the use of digital signatures as a mean to ensure the authenticity, integrity and validity of these frames.

Performance evaluation results showed that our Neural Network scheme has a 95% accuracy rate which is higher than existing schemes in this field. In addition, evaluation of the Counter Disassociation Mechanism (CDM) scheme showed that a higher security enhancement is feasible without introducing a big overhead by using MD5-RSA as the digital signature alogrithm.

Partial Contents

Table of figures -- 1. Introduction -- 2. Previous related work and literature review -- 3. A novel neurocomputing-based scheme to authenticate WLAN users employing distance proximity threshold -- 4. New wireless security scheme: counter diassociation method (CDM) in wireless local area networks -- 5. Conclusions and recommendations -- Index -- References -- Appendix A. Neural network training source code -- Appendix B. Counter disassociation attack source code -- Appendix C. NS2 simulation code.

Source

Repository Details

Part of the Monmouth University Library Archives Repository

Contact:
Monmouth University Library
400 Cedar Avenue
West Long Branch New Jersey 07764 United States
732-923-4526